1581, 1/80 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   koresong
   °õÇÿ¡¼­ Ãë¾àÁ¡ÀÌ ¹ß°ß

http://www.hackerschool.org/HS_Boards/zboard.php?id=Free_Lectures&no=888 [º¹»ç]


  ###  °õÇÿ¡¼­ Ãë¾àÁ¡ÀÌ ¹ß°ß ###


IE6¿¡ XP SP2¸¦ ´ë»óÀ¸·Î ÀÛ¼ºµÈ PoC (Proof of Concept) Äڵ尡 ¸ð »çÀÌÆ®¿¡ °ø°³µÇ¾ú½À´Ï´Ù.
°õÇ÷¹À̾ ¼³Ä¡µÈ »óÅ¿¡¼­ ÀÎÅÍ³Ý ÀͽºÇ÷η¯¸¦ »ç¿ëÇϽô ºÐµéÀº ´çºÐ°£ À¥ ¼­ÇÎÇÏ½Ç ¶§
ÁÖÀÇÇϽñ⠹ٶø´Ï´Ù. °Ô½Ã¹°À» À߸ø Ŭ¸¯Çϸé ÀÌ»óÇÑ ÇÁ·Î±×·¥ÀÌ ´Ù¿î·ÎµåµÇ¾î ½ÇÇàµÉ ¼ö ÀÖ½À´Ï´Ù.
ActiveX¸¦ ÀÌ¿ëÇÑ °ø°ÝÀ̹ǷΠActiveX¸¦ Áö¿øÇÏÁö ¾Ê´Â ºê¶ó¿ìÀú¸¦ »ç¿ëÇÒ °æ¿ì ¾ÈÀüÇÕ´Ï´Ù.

¾Æ·¡´Â ÇØ´ç PoC ÄÚµåÀÇ ÁÖ¼®ºÎºÐÀÔ´Ï´Ù.

GOM Player 2.1.6.3499 GomWeb Control (GomWeb3.dll 1.0.0.12) remote buffer
overflow poc exploit (ie6/xp sp2)

quote from Wikipedia: "GOM Player(Gretech Online Movie Player) is South
Korea's most popular media player; as of July 2007, it had 8.4 million users,
compared to 5.4 million of Microsoft's Windows Media Player. Users most
commonly use the player to watch pornography..."
mphhh ...

passing more than 506 "A" to OpenUrl method:

EAX 00000000
ECX 7C80240F kernel32.7C80240F
EDX 7C91EB94 ntdll.KiFastSystemCallRet
EBX 00000000
ESP 0012CDD0 ASCII "AAAAAAAAAAAAAAAAAA...
EBP 0012DE08
ESI 003390B0
EDI 0000102A
EIP 41414141

object safety report:
RegKey Safe for Script: True
RegKey Safe for Init: True
Implements IObjectSafety: True
IDisp Safe:  Safe for untrusted: caller,data
IPersist Safe:  Safe for untrusted: caller,data
IPStorage Safe:  Safe for untrusted: caller,data

software site: http://www.gomplayer.com/main.html

rgod
site: http://retrogod.altervista.org

==================================================

ÀÌ·¸´Ù°í ÇÕ´Ï´Ù

»ç¿ëÇϽôºеéÀº ÁÖÀÇÇØÁÖ¼¼¿ä~

(Æß±ÛÀÔ´Ï´Ù)

  Hit : 10699     Date : 2007/11/01 02:46



    
qkreoghks00 ¼Ò½ºÄڵ尡 ÀÌÇØ°¡ µÇ¾ß ½É°¢¼ºÀ» ±ú´ÝÁÒ;; Çؼ®ÀÌ¶óµµ ÇØÁֽǺÐ~ 2007/11/01  
image554 °õ Ç÷¹À̾ ½ÇÇàµÈ ÄÄÇ»ÅÍ¿¡¼­ ¿¢Æ¼ºê¿¢½º¸¦ ½ÇÇàÇÒ ¼öÀÖ´Â ºê¶ó¿ìÁ®·Î À§ ¼Ò½º¸¦ ·ÎµåÇÏ°Ô µÇ¸é, »ç¿ëÀÚÀÇ ÄÄÇ»ÅÍ¿¡ ÇØÄ¿°¡ ÀǵµÇÑ ÇÁ·Î±×·¥À» ½ÇÇàÇÒ ¼ö ÀÖ½À´Ï´Ù.. 2007/11/02
image554 À§¿¡´Â ½ÇÁ¦ ÄÚµå´Â ¾ø³×¿ä.. ¾¾Å¥´Ï¾Æ¿¡ °¡½Ã¸é exploitÄڵ嵵 °ø°³µÇ¾î ÀÖ½À´Ï´Ù! 2007/11/02
¼Û½Ã overflow remote attack 2007/11/02  
È£¸®¿¡À¯ÀÌ 2.1.6.3499 ¹öÀü ¾ê±â±º¿ä. ±×·³ 2.1.8.3683 ¹öÀüÀº¿ä? 2007/11/05  
¤©¤© ±×·¯´Ï±î firefox°¡ ÁÁ½À´Ï´Ù. IE´Â ´çÀå ¹ö¸®¼¼¿ä 2007/11/11
°ËÀº¿ù¾Æ passing more than 506 "A".. ¾Ð¹ÚÀÌ³×¿ä ¤»¤» 2007/11/29  
jin1055 ¾Æ¹«·¡µµ IEÃÊ´ëÇü°³ÆíÀÌ ÇÊ¿äÇÏ°Ú³×;;; 2007/12/12  
moongchiza ¹Ð¿ú°¡½Ã¸é °ø°³µÇ¾îÀִµ¥ °øºÎÁ» ÇÏ¼Å¾ßµÊ ¤¾¤¾ 2007/12/26  
     [°øÁö] °­Á¸¦ ¿Ã¸®½Ç ¶§´Â ¸»¸Ó¸®¸¦ ´Þ¾ÆÁÖ¼¼¿ä^¤Ñ^ [29] ¸Û¸Û 02/27 18807
1580   °í¼ö´ÔµéÀÇ µµ¿òÀ» ¹Þ°í ½Í½À´Ï´Ù     vbnm111
02/11 275
1579   ¸®´ª½º Ä¿³Î 2.6 ¹öÀü ÀÌÈÄÀÇ LKM     jdo
07/25 769
1578   ½©ÄÚµå ¸ðÀ½     ÇØÅ·ÀßÇÏ°í½Í´Ù
01/15 1601
1577   Call by value VS Call by Reference     ÇØÅ·ÀßÇÏ°í½Í´Ù
01/15 971
1576   (²Ä¼ö) L.O.B Çѹ濡 Ŭ¸®¾îÇϱâ[2]     ÇØÅ·ÀßÇÏ°í½Í´Ù
01/14 1320
1575   towelroot.c (zip) ÄÚ¸àÆÃ.[1]     scube
08/18 3841
1574   levitator.c (¾Èµå·ÎÀÌµå ·çÆÃ) °ø°Ý ºÐ¼® ¼Ò½º ÄÚµå °øÀ¯.[4]     scube
08/17 3741
1573   ¹«·á Á¤º¸º¸¾È ±â¼úÀÎÀç ¾ç¼º °úÁ¤ ±³À°»ý ¸ðÁý     chanjung111
06/17 4553
1572   K-Shield ÁִϾî 5±â ¸ðÁý     lrtk
06/17 4276
1571   [ÆÁ] ÆÄÀ̽ã 2¼Ò½º¸¦ 3À¸·Î º¯°æÇØÁÖ´Â »çÀÌÆ®[3]     ÇѽÂÀç
05/13 3978
1570   ±¸±Û ¹é¸µÅ© ÀÛ¾÷ Áú¹®¿ä     wkatnxka
03/30 3409
1569   [ÆÁ] ¿ìºÐÅõ ¹Ì·¯¸µ¼­¹ö     ÇѽÂÀç
03/09 4106
1568 ºñ¹Ð±ÛÀÔ´Ï´Ù  °¨À»¸øÀâ°Ú³×¿ä¤Ì¤Ì     À×À×À×
01/15 3
1567   µ¥ºñ¾È °è¿­ ¸®´ª½º ÀÇÁ¸¼º ±úÁ³À»¶§ ÇØ°á¹ý     ÇѽÂÀç
11/27 4598
1566   È«º¸ÇÕ´Ï´Ù. ½Å»ý º¸¾ÈÄ¿¹Â´ÏƼÀÔ´Ï´Ù.     kimwoojin0952
10/26 4318
1565   ½Å±âÇÑ ÇÁ·Î±×·¡¹Ö ¾ð¾î[3]     koreal33t
09/06 4713
1564   À©µµ¿ì,¸®´ª½º¿¡¼­ ³» ip¸¦ È®ÀÎÇØ º¸ÀÚ [1]     koreal33t
09/06 3916
1563   CTF »çÀÌÆ®[1]     koreal33t
09/06 4576
1562   ÀÚ°ÝÁõ (¹®Á¦)»çÀÌÆ® [2]     koreal33t
09/06 4390
1 [2][3][4][5][6][7][8][9][10]..[80]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org